Analysis

  • max time kernel
    84s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 21:34

General

  • Target

    431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe

  • Size

    219KB

  • MD5

    1dc0d08b42883b5181f03f7789fd0940

  • SHA1

    e0d0c5fba1838442e9d516e3ebb592824ff5c1a5

  • SHA256

    431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2

  • SHA512

    e04a9050860ac974b27d893d596fe16c0421d8ac0c9833b89503c54704a9b33cacac40fbeb44b04b2bfbac0b0070ba54667db577763dcb888fe4bbf194e85e88

  • SSDEEP

    6144:MseuA1t5U0Ta3K06bULdec4hhQ7l9qCaEs:KuAr5UU5BbULoc4hh+pi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe
    "C:\Users\Admin\AppData\Local\Temp\431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Users\Admin\AppData\Local\Temp\DIQM\Mozilla-Thunderbird_081\431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe
      C:\Users\Admin\AppData\Local\Temp\DIQM\Mozilla-Thunderbird_081\431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe /path="C:\Users\Admin\AppData\Local\Temp\431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DIQM\Mozilla-Thunderbird_081\DomaIQ10.exe

    Filesize

    242KB

    MD5

    d065df740425479d50c90fd4b7bf0e1f

    SHA1

    d590fbc938934bf4bce9b1da2b5d0258a32c5153

    SHA256

    8a2b01932a72df982a4493f35f130127d6a406825cde0b70e4226e30b45d07c0

    SHA512

    169bff3556fac0da26490ab28b255fbadab72e6bc378e3bcc32bb04341bfcd147d06a069e7cc7c4212f911ada3088538e940c0907ca75739e06c72216e6ac7a8

  • C:\Users\Admin\AppData\Local\Temp\DIQM\Mozilla-Thunderbird_081\config.dll

    Filesize

    48B

    MD5

    5c0168240b05163c6e18379f85459d25

    SHA1

    563539de939fc674b32c113c76d7d24db656764c

    SHA256

    722baa0a7e61fd991691edb5ebb35067ef883599e39c3a75cf4a4f3fd872ef5c

    SHA512

    5679424d045bb942723dc8cc508339cee4772b6d8ff2f3fa2fcc79bf421449de2ebb1987194d28b86f4a40b011236d8a30134a5106af9ba39c763fb52773ffeb

  • C:\Users\Admin\AppData\Local\Temp\DIQM\Mozilla-Thunderbird_081\routes.dll

    Filesize

    253B

    MD5

    289c7270591d46dd34623e2c79052a84

    SHA1

    adbde0e0deabe7713e2b13efa7587c4f7d03dcea

    SHA256

    831b5ddcb0c8661242e7836c554eac792db5ee926935e91d9a51c45bf026bff5

    SHA512

    12227cf1b0b64a0ef58c858077233eb460eeb0d8b9e2bbc8eed6f993bda0db025ed5b657dbee5545d79bac4419681ede6e8736f31c12f77b6943114d10d42ccb

  • \Users\Admin\AppData\Local\Temp\nsyE7B2.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • memory/2504-29-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

    Filesize

    9.6MB

  • memory/2504-28-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

    Filesize

    9.6MB

  • memory/2504-27-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

    Filesize

    9.6MB

  • memory/2504-30-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

    Filesize

    9.6MB

  • memory/2504-31-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

    Filesize

    9.6MB

  • memory/2504-32-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

    Filesize

    9.6MB

  • memory/2504-23-0x000007FEF692E000-0x000007FEF692F000-memory.dmp

    Filesize

    4KB

  • memory/2504-35-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

    Filesize

    9.6MB

  • memory/2504-37-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

    Filesize

    9.6MB

  • memory/2684-7-0x0000000002800000-0x0000000002801000-memory.dmp

    Filesize

    4KB